• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 682
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1060
  • 1060
  • 304
  • 269
  • 219
  • 216
  • 203
  • 195
  • 156
  • 112
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices

Abu Mahfouz, Adnan Mohammed I. January 2004 (has links)
Thesis (M.Sc.)(Computer Science)--University of Pretoria, 2004. / Summaries in English and Afrikaans. Includes bibliographical references.
72

Role-based access control for coalition partners in maritime domain awareness /

McDaniel, Christopher R. Tardy, Matthew L. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): James B. Michael, Alan A. Ross. Includes bibliographical references (p. 81-83). Also available online.
73

Computer forensics methodology and praxis

Morrison, Robin Cincinnatis, January 2006 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2006. / Title and description from thesis home page (viewed Jan. 30, 2007). Department of Computer Engineering and Computer Science. Vita. "August 2006." Includes bibliographical references (p. 79-82).
74

Learning from perturbed data for privacy-preserving data mining

Ma, Jianjie, January 2006 (has links) (PDF)
Thesis (Ph. D.)--Washington State University, August 2006. / Includes bibliographical references (p. 132-138).
75

The SOX compliant SAP security implementation

Candelaria, Michael E. January 2006 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2006. / Title from PDF title page (viewed on May 25, 2006). Includes bibliographical references.
76

A theory for the design and analysis of firewalls

Liu, Xiang-Yang Alexander, January 1900 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2006. / Vita. Includes bibliographical references.
77

Polar proxies collaborating to achieve anonymous web browsing /

Tillwick, Heiko Mark. January 2007 (has links)
Thesis (M.Sc.)(Computer Science)--University of Pretoria, 2007. / Includes summary. Includes bibliographical references. Available on the Internet via the World Wide Web.
78

Widespread Internet attacks defense-oriented evolution and countermeasures /

Wang, Xun, January 2007 (has links)
Thesis (Ph. D.)--Ohio State University, 2007. / Title from first page of PDF file. Includes bibliographical references (p. 151-162).
79

Deploying a secure Windows operating system and applications

Miles, Russell Slater, January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
80

An architectural approach to achieving higher-level security for component (service) based software systems

Vorobiev, Artem. January 2008 (has links)
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008. / Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)

Page generated in 0.052 seconds